jclt via anysend.exe

AnySend

ClickMeIn Limited

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application jclt via anysend.exe by ClickMeIn Limited has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the installCore installer. The file has been seen being downloaded from www.anysend.com.
Publisher:
AnySend.com  (signed by ClickMeIn Limited)

Product:
AnySend

Description:
AnySend Setup

Version:
1.0.0.49

MD5:
b48542ed8cc8738c44c606757f2e077f

SHA-1:
ab018b11ae233d83e5b5cce321b767a36fc9b1ab

SHA-256:
4e627533b323764102aef4091862ad882175993e6c4b0d601c9c8d2cad4b2138

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/25/2024 10:52:51 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.installCore.ClickMeI.Installer (M)
16.6.7.1

File size:
364.2 KB (372,896 bytes)

Product version:
1.0.0.49

Copyright:
Copyright 2012

Trademarks:
AnySend is a registered trademark of CMI

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\jclt via anysend.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/12/2012 1:00:00 AM

Valid to:
3/3/2015 12:59:59 AM

Subject:
CN=ClickMeIn Limited, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=ClickMeIn Limited, L=Nicosia, S=Nicosia, C=CY

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0181B78FA98E62B38390017BFFA25E8C

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:re34d+eWar72ksl3DUG4lXAyOOki2TYRsJtBUUJyQajflwsceg/MnPOaE:BWS5F9A7TBzJyPjXceg/MnP

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file jclt via anysend.exe has been seen being distributed by the following URL.

Remove jclt via anysend.exe - Powered by Reason Core Security